ebook img

DTIC ADA494936: New Tactics for a New Enemy PDF

0.14 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview DTIC ADA494936: New Tactics for a New Enemy

New Tactics for a New Enemy By John C. Decker Over the last century American law enforcement has a successful track record of investigating, arresting and severely degrading the capabilities of organized crime. These same techniques should be adopted by the military when targeting asymmetrical Figure 1 Alleged Gambino family member apprehended in a multi- insurgents and terrorist organizations. agency sweep of 87 suspects in early 2008, severely disrupting the Gambino's family activities. (Robert Stolarik for The New York Times) Other “outside the box” thinking has been successfully employed in Iraq such as taking censuses, utilizing BATS (biometric automated toolset systems) to successfully identify correct individuals, using anthropologists to help define human terrain, and using multimillion dollar systems to jam garage door remotes as a counter-IED measure. These all demonstrate that we have to be ingenious and open to ideas from all sectors of society to counter and defeat our enemies. The main benefit of using law enforcement tactics, training and procedures (TTP’s) would be more focused intelligence collection techniques on individuals and organizations and better training of soldiers on what types of Figure 2 Human terrain mapping, overlapping ethnic and tribal tactical questions (TQ’s) to ask, and regions of standard political map (Naval Postgraduate School, Kunar province, www.nps.edu/Programs/CCS/Kunar.html) sensitive site preservation. This would 1 | Page Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2008 2. REPORT TYPE 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER New Tactics for a New Enemy 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION University of Military Intelligence,Fort Huachuca,Sierra Vista,AZ,85613 REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF ABSTRACT OF PAGES RESPONSIBLE PERSON a. REPORT b. ABSTRACT c. THIS PAGE Same as 5 unclassified unclassified unclassified Report (SAR) Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 New Tactics for a New Enemy By John C. Decker also have added benefits by decreasing the antagonism created by detaining the wrong individuals, increase the Iraqi Judicial conviction rate, and decrease the number of individuals captured but later released due to a lack of evidence. By DoD definition terrorism as “The calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.i” And the FBI defines organized crime activities as “the use of actual or threatened violence, corrupt public officials, graft, or extortion, and generally have a significant impact on the people in their locales, region, or the country as a whole.ii” Because of the similarities in structure, and actions between organized crime, insurgents, and terrorist organizations, it is a simple transition to transfer TTP’s of the law enforcement community to the intelligence collection and targeting process. The TTP’s that would have the largest return on investment on the “every soldier as a sensor” category would focus on tactical questioning during raids and at traffic control points (TCP’s) and preservation of raid sites for exploitation of sensitive materials, documents, and electronics. Whereas the S2 section would focus on more detective-like tasks such as exploiting and assess sensitive materials, background investigations on person’s and events, and building evidence and linking individuals to groups and groups to events. The training for this would be done on independent timelines as needed by different units, but would focus on working with and learning the TTP’s from the law enforcement community. The difficulty with this detective-based training would be integrating it into an already tight training schedule while maintaining all the standard competences and tool training the Army already has in place for this type of mission – such as Analyst Notebook, Pathfinder and pattern analysis. Additionally, the S2’s will need further training on working with ES2’s, the field sensors in the Global War on Terror (GWOT). In order to provide the new training, some element of the current curriculum will be forfeited. The argument 2 | Page New Tactics for a New Enemy By John C. Decker for this forfeiture being that right now the GWOT, and asymmetrical warfare fighting, are the most likely situations our forces will find themselves in over the next 10-15 yearsiii. As such, more emphasis should be placed on successful methods to combat this warfare, instead of training focused on force-on-force conventional warfare tactics. As a specific example, my unit, a CSSB BN in the ARNG, would spend one weekend a quarter learning the TTP’s from a local law enforcement agency. This course would be approximately 3 hours. The drill following the course would have a 2-3 hour session on reviewing and practicing the previous drills TTP’s and giving a short presentation as needed to our soldiers for ES2 training. The 3rd drill in a given quarter would spend 2-3 hours working on a joint scenario with the line soldiers to practice the S2 and ES2 TTP’s seamlessly. The following quarters would pursue a similar pattern with a culmination event working with the local law enforcement so they can monitor and give feedback on the application of the TTP’s taught. A one quarter training example for drill weekends (1 day being for soldiering skills, 1 day being for section specific training) is given below to demonstrate how this training could be fit into a standard training plan: 3 | Page New Tactics for a New Enemy By John C. Decker Collective Rehearsal Dates METL Task(s) Individual Task (if applicable) Notes Trainer Comments Reference Task Date Develop an Incident Overlay (TN: 301- STP 34-96B15- IPB SGT XXX 1.5 hours SEP-XX 96B-1160/ REF: STP 34-96B16-SM-TG) SM-TG Provide Command Perform Develop Demographic and Population and Control (63-1- Intelligence STP 34-96B15- Overlay (TN: 301-96B-1159/ REF: STP IPB LT XXX 1.5 hours SEP-XX 4045), & Provide Preparation of SM-TG OCT-XX 34-96B16-SM-TG) Tactical or the Battlefield Develop a Situation Template (TN: 301- STP 34-96B15- Operational (IPB) (20-7- IPB SGT XXX 2 hours SEP-XX 96B-1153/ REF: STP 34-96B15-SM-TG SM-TG Logistics Support 1010) Securing a site for SSE and Law Local law forensics/historical search for similar enforcment 3 hours enforcment events (MO) TTP's Assist in the Development of Intelligence Preperation of the STP 34-96B15- IPB SGT XXX 2 hours OCT-XX Battlefield (IPB) Products (TN: 301-96b- SM-TG 1350/ REF: STP 34-96B16-SM-TG) Provide Command Perform between drills and Control (63-1- Intelligence Write an Analytical Paper (TN: 301-96B- Analytical and 3 hours STP 34-96B15- LT XXX OCT-XX NOV- 4045), & Provide Preparation of 2451/ REF: STP 34-96B16-SM-TG) Thinking for SM-TG XX Tactical or the Battlefield presentations Operational (IPB) (20-7- S2 3 hours (2 Logistics Support 1010) practice hours Securing a site for SSE and and practice, 1 forensics/historical search for similar LT XXX OCT-XX presentatio hour events (MO) n to line instruction to CO's CO's) STP 21-24- Report Intelligence Information (TN: 301- SGT XXX 2 hours SMCT/ STP 34- NOV-XX 371-1000/ REF: STP 21-1-SMCT) Provide Command 96B15-SM-TG Integrate Threat Capabilities into STP 21-24- and Control (63-1- Provide Intel Mission planning (TN: 159-200-2020/ SGT XXX 2 hours SMCT/ STP 34- NOV-XX 4045) (U), & Support to REF: STP 21-24-SMCT 96B15-SM-TG DEC-XXProvide Tactical or Deployment (34- Law Operational 6-2049) enforcment Logistics Support Securing a site for SSE and TTP's. (U) forensics/historical search for similar SGT XXX 2 hours NOV-XX Scenario events (MO) with line CO's To continue to successfully pursue this war, we must be as adaptive and ingenious as our foe and modify our strengths so the enemy cannot negate them. By borrowing TTP’s from the law enforcement community we can streamline our targeting and associated intelligence collection efforts, we can be more precise in whom we target and, thus, decrease negative attributes such as wrongful detention, or “catch and release” situations. Adding additional training into an already over packed training schedule will cause challenges. However, due to the likelihood of similar operations continuing for the next decade and beyond, a new approach should be emphasized over more traditional intelligence training. 1LT John “Chris” Decker is the S2 in the 158th CSSB. He enlisted in the Army in 2003, followed by ROTC in 2004-2006 while attending graduate school, and has recently completed his BOLC courses. He is 4 | Page New Tactics for a New Enemy By John C. Decker a graduate of Arizona State University’s Ira Fulton School of Engineering with a Masters Degree in Material Science Engineering. 1LT Decker is a full time employee with Intel Corporation as a Process Engineer as his civilian career. i Department of Defense definition of terrorism, Joint Pub 1-02, Department of Defense Dictionary of Military and Associated Terms, 12 April 2001 ii Federal Bureau of Investigation definition of Organized Crime, http://www.fbi.gov/hq/cid/orgcrime/glossary.htm iii US Army TRADOC, MIBOLC III course material/instructions 5 | Page

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.